INTERNET RELAY CHAT SERVICES FRAMEWORK: Gnuworld By

Total Page:16

File Type:pdf, Size:1020Kb

INTERNET RELAY CHAT SERVICES FRAMEWORK: Gnuworld By INTERNET RELAY CHAT SERVICES FRAMEWORK: GNUWorld By DANIEL ROBERT KARRELS A THESIS PRESENTED TO THE GRADUATE SCHOOL OF THE UNIVERSITY OF FLORIDA IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER OF SCIENCE UNIVERSITY OF FLORIDA 2003 Copyright 2003 by Daniel Karrels I dedicate this thesis to my parents. ACKNOWLEDGMENTS I thank my Mother and Father for their persevering support. Even through difficult times, and decisions with which they did not agree, they supported me in my endeavors. I thank Joseph N. Wilson for his excellent teaching and helping to spark my interest in computer science. I thank my graduate committee, Beverly A. Sanders and Richard E. Newman, for their support and feedback. Without their assistance, I would not have made it this far. iv TABLE OF CONTENTS Page ACKNOWLEDGMENTS ................................................................................................. iv LIST OF TABLES............................................................................................................ vii LIST OF FIGURES ......................................................................................................... viii ABSTRACT....................................................................................................................... ix 1 OVERVIEW OF INTERNET RELAY CHAT ............................................................1 History of Internet Relay Chat......................................................................................3 Organization of Thesis..................................................................................................4 2 INTERNET RELAY CHAT NETWORK SERVICES................................................5 Maintaining Channel Order ..........................................................................................5 Channel Power Struggles..............................................................................................6 Network Abuse .............................................................................................................7 Overview of IRC Network Services.............................................................................8 Overview of GNUWorld ..............................................................................................9 History of Undernet IRC Network Services.................................................................9 3 GNUWorld AND THE VIRTUAL FILE SYSTEM MODEL...................................12 Overview of the Virtual File System Model...............................................................12 GNUWorld versus the VFS........................................................................................13 Function ......................................................................................................................14 Associating Files and Users........................................................................................14 Pages and Streams ......................................................................................................17 Summary.....................................................................................................................19 4 SIGNAL HANDLING................................................................................................20 Possible Solutions.......................................................................................................21 A Deterministic Solution ............................................................................................23 GNUWorld Signal Class.............................................................................................23 v Pitfalls.........................................................................................................................24 5 HOSTNAME TRIE ....................................................................................................26 Introduction.................................................................................................................26 Suffix Tries .................................................................................................................28 The GNUWorld Hostname Trie .................................................................................29 Wild Card Searches ....................................................................................................30 Performance................................................................................................................31 Structure......................................................................................................................32 Search Strings .............................................................................................................33 Pitfalls.........................................................................................................................37 Conclusions.................................................................................................................37 6 SUMMARY................................................................................................................38 Design Accomplishments ...........................................................................................38 The Future of GNUWorld ..........................................................................................39 LIST OF REFERENCES...................................................................................................41 BIOGRAPHICAL SKETCH .............................................................................................43 vi LIST OF TABLES Table page 5-1 Common search keys and comparisons against real hostnames..................................27 5-2 Common IRC hostname search strings .......................................................................36 vii LIST OF FIGURES Figure page 1-1 Sharing of network data among IRC servers.................................................................2 3-1 Modular design of GNUWorld....................................................................................14 3-2 Number of channels joined by each user on a large network......................................17 5-1 Structure of a hostname trie with four hostnames .......................................................30 5-2 Distribution of 125,996 hostnames found on the Undernet IRC network...................32 5-3 Total number of subtrees per node, organized by level...............................................34 5-4 Number of values per node in the hostname trie.........................................................35 5-5 Searches performed using nine realistic search strings ...............................................36 viii Abstract of Thesis Presented to the Graduate School of the University of Florida in Partial Fulfillment of the Requirements for the Degree of Master of Science INTERNET RELAY CHAT SERVICES FRAMEWORK: GNUWorld By Daniel Robert Karrels December 2003 Chair: Joseph N. Wilson Major Department: Computer and Information Science and Engineering GNUWorld is an Internet Relay Chat (IRC) server. IRC is a real-time text-communication mechanism. Used by hundreds of thousands of people on a daily basis, IRC has existed since the inception of the internet. Unlike other IRC servers, GNUWorld does not support IRC clients. Instead, it provides an IRC network-support mechanism. It may be custom tailored to perform any type of support operation necessary on IRC. GNUWorld is frequently used to ensure proper authentication of IRC users, and to aid in battling IRC network abuse. ix CHAPTER 1 OVERVIEW OF INTERNET RELAY CHAT Internet Relay Chat, (or IRC for short) is a real-time communication mechanism used on the internet. On IRC, users have the opportunity to communicate with each other either publicly or privately. Most IRC clients also provide the ability to share files. Users wishing to participate in one or more IRC conversations use an IRC client to connect to an IRC network. Users are identified by a unique sequence of characters chosen at the time of connection, known as a nickname. This nickname is usually chosen to represent the person’s personality or individuality, and most users attempt to use the same nickname each time they connect to IRC. If the desired nickname is already taken by another user, then another nickname must be chosen. Any specific nickname may or may not be available when a user attempts to connect to the IRC network. It is also possible to change nicknames while connected to IRC. Once connected, a user is free to communicate with a single individual in private messages, or with groups of individuals by joining channels. Private messaging takes place between exactly two users on an IRC network. A user engages in private messaging by sending a message to another user. Users choosing to engage in private messaging are not required to join any channel. However, any user may be on any number of channels, and may send private messages to other users while connected to an IRC network. 1 2 A channel provides a method for many users to communicate simultaneously on a given subject of interest to the group. Any text submitted by a user into a channel is transmitted to each user in that channel. An IRC network may have many thousands of channels to choose from, covering a wide range of topics. An IRC network is a group of one or more IRC servers connected to each other. Most servers on an IRC network accept incoming client connections.
Recommended publications
  • Application Log Analysis
    Masarykova univerzita Fakulta}w¡¢£¤¥¦§¨ informatiky !"#$%&'()+,-./012345<yA| Application Log Analysis Master’s thesis Júlia Murínová Brno, 2015 Declaration Hereby I declare, that this paper is my original authorial work, which I have worked out by my own. All sources, references and literature used or excerpted during elaboration of this work are properly cited and listed in complete reference to the due source. Júlia Murínová Advisor: doc. RNDr. Vlastislav Dohnal, Ph.D. iii Acknowledgement I would like to express my gratitude to doc. RNDr. Vlastislav Dohnal, Ph.D. for his guidance and help during work on this thesis. Furthermore I would like to thank my parents, friends and family for their continuous support. My thanks also belongs to my boyfriend for all his assistance and help. v Abstract The goal of this thesis is to introduce the log analysis area in general, compare available systems for web log analysis, choose an appropriate solution for sample data and implement the proposed solution. Thesis contains overview of monitoring and log analysis, specifics of application log analysis and log file formats definitions. Various available systems for log analysis both proprietary and open-source are compared and categorized with overview comparison tables of supported functionality. Based on the comparison and requirements analysis appropriate solution for sample data is chosen. The ELK stack (Elasticsearch, Logstash and Kibana) and ElastAlert framework are deployed and configured for analysis of sample application log data. Logstash configuration is adjusted for collecting, parsing and processing sample data input supporting reading from file as well as online socket logs collection. Additional information for anomaly detection is computed and added to log records in Logstash processing.
    [Show full text]
  • Analysis of Web Logs and Web User in Web Mining
    International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.1, January 2011 ANALYSIS OF WEB LOGS AND WEB USER IN WEB MINING L.K. Joshila Grace 1, V.Maheswari 2, Dhinaharan Nagamalai 3, 1Research Scholar, Department of Computer Science and Engineering [email protected] 2 Professor and Head,Department of Computer Applications 1,2 Sathyabama University,Chennai,India 3Wireilla Net Solutions PTY Ltd, Australia ABSTRACT Log files contain information about User Name, IP Address, Time Stamp, Access Request, number of Bytes Transferred, Result Status, URL that Referred and User Agent. The log files are maintained by the web servers. By analysing these log files gives a neat idea about the user. This paper gives a detailed discussion about these log files, their formats, their creation, access procedures, their uses, various algorithms used and the additional parameters that can be used in the log files which in turn gives way to an effective mining. It also provides the idea of creating an extended log file and learning the user behaviour. KEYWORDS Web Log file, Web usage mining, Web servers, Log data, Log Level directive. 1. INTRODUCTION Log files are files that list the actions that have been occurred. These log files reside in the web server. Computers that deliver the web pages are called as web servers. The Web server stores all of the files necessary to display the Web pages on the users computer. All the individual web pages combines together to form the completeness of a Web site. Images/graphic files and any scripts that make dynamic elements of the site function.
    [Show full text]
  • SILC-A SECURED INTERNET CHAT PROTOCOL Anindita Sinha1, Saugata Sinha2 Asst
    ISSN (Print) : 2320 – 3765 ISSN (Online): 2278 – 8875 International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering Vol. 2, Issue 5, May 2013 SILC-A SECURED INTERNET CHAT PROTOCOL Anindita Sinha1, Saugata Sinha2 Asst. Prof, Dept. of ECE, Siliguri Institute of Technology, Sukna, Siliguri, West Bengal, India 1 Network Engineer, Network Dept, Ericsson Global India Ltd, India2 Abstract:-. The Secure Internet Live Conferencing (SILC) protocol, a new generation chat protocol provides full featured conferencing services, compared to any other chat protocol. Its main interesting point is security which has been described all through the paper. We have studied how encryption and authentication of the messages in the network achieves security. The security has been the primary goal of the SILC protocol and the protocol has been designed from the day one security in mind. In this paper we have studied about different keys which have been used to achieve security in the SILC protocol. The main function of SILC is to achieve SECURITY which is most important in any chat protocol. We also have studied different command for communication in chat protocols. Keywords: SILC protocol, IM, MIME, security I.INTRODUCTION SILC stands for “SECURE INTERNET LIVE CONFERENCING”. SILC is a secure communication platform, looks similar to IRC, first protocol & quickly gained the status of being the most popular chat on the net. The security is important feature in applications & protocols in contemporary network environment. It is not anymore enough to just provide services; they need to be secure services. The SILC protocol is a new generation chat protocol which provides full featured conferencing services; additionally it provides security by encrypting & authenticating the messages in the network.
    [Show full text]
  • Universidad Pol Facultad D Trabajo
    UNIVERSIDAD POLITÉCNICA DE MADRID FACULTAD DE INFORMÁTICA TRABAJO FINAL DE CARRERA ESTUDIO DEL PROTOCOLO XMPP DE MESAJERÍA ISTATÁEA, DE SUS ATECEDETES, Y DE SUS APLICACIOES CIVILES Y MILITARES Autor: José Carlos Díaz García Tutor: Rafael Martínez Olalla Madrid, Septiembre de 2008 2 A mis padres, Francisco y Pilar, que me empujaron siempre a terminar esta licenciatura y que tanto me han enseñado sobre la vida A mis abuelos (q.e.p.d.) A mi hijo icolás, que me ha dejado terminar este trabajo a pesar de robarle su tiempo de juego conmigo Y muy en especial, a Susana, mi fiel y leal compañera, y la luz que ilumina mi camino Agradecimientos En primer lugar, me gustaría agradecer a toda mi familia la comprensión y confianza que me han dado, una vez más, para poder concluir definitivamente esta etapa de mi vida. Sin su apoyo, no lo hubiera hecho. En segundo lugar, quiero agradecer a mis amigos Rafa y Carmen, su interés e insistencia para que llegara este momento. Por sus consejos y por su amistad, les debo mi gratitud. Por otra parte, quiero agradecer a mis compañeros asesores militares de Nextel Engineering sus explicaciones y sabios consejos, que sin duda han sido muy oportunos para escribir el capítulo cuarto de este trabajo. Del mismo modo, agradecer a Pepe Hevia, arquitecto de software de Alhambra Eidos, los buenos ratos compartidos alrrededor de nuestros viejos proyectos sobre XMPP y que encendieron prodigiosamente la mecha de este proyecto. A Jaime y a Bernardo, del Ministerio de Defensa, por haberme hecho descubrir las bondades de XMPP.
    [Show full text]
  • Abstract Introduction Methodology
    Kajetan Hinner (2000): Statistics of major IRC networks: methods and summary of user count. M/C: A Journal of Media and Culture 3(4). <originally: http://www.api-network.com/mc/0008/count.html> now: http://www.media-culture.org.au/0008/count.html - Actual figures and updates: www.hinner.com/ircstat/ Abstract The article explains a successful approach to monitor the major worldwide Internet Relay Chat (IRC) networks. It introduces a new research tool capable of producing detailed and accurate statistics of IRC network’s user count. Several obsolete methods are discussed before the still ongoing Socip.perl program is explained. Finally some IRC statistics are described, like development of user figures, their maximum count, IRC channel figures, etc. Introduction Internet Relay Chat (IRC) is a text-based service, where people can meet online and chat. All chat is organized in channels which a specific topic, like #usa or #linux. A user can be taking part in several channels when connected to an IRC network. For a long time the only IRC network has been EFnet (Eris-Free Network, named after its server eris.berkeley.edu), founded in 1990. The other three major IRC networks are Undernet (1993), DALnet (1994) and IRCnet, which split off EFnet in June 1996. All persons connecting to an IRC network at one time create that IRC network’s user space. People are constantly signing on and off, the total number of users ever been to a specific IRC network could be called social space of that IRC network. It is obvious, that the IRC network’s social space by far outnumbers its user space.
    [Show full text]
  • Users As Co-Designers of Software-Based Media: the Co-Construction of Internet Relay Chat
    Users as Co-Designers of Software-Based Media: The Co-Construction of Internet Relay Chat Guillaume Latzko-Toth Université Laval AbsTrAcT While it has become commonplace to present users as co-creators or “produsers” of digital media, their participation is generally considered in terms of content production. The case of Internet Relay Chat (IRC) shows that users can be fully involved in the design process, a co-construction in the sense of Science and Technology Studies (STS): a collective, simultaneous, and mutual construction of actors and artifacts. A case study of the early de - velopment of two IRC networks sheds light on that process and shows that “ordinary users” managed to invite themselves as co-designers of the socio-technical device. The article con - cludes by suggesting that IRC openness to user agency is not an intrinsic property of software- based media and has more to do with its architecture and governance structure. Keywords Digital media; Communication technology; Co-construction; Design process; Ordinary user résumé Il est devenu banal de présenter l’usager comme cocréateur ou « produtilisateur » des médias numériques, mais sa participation est généralement envisagée comme une production de contenus. Le cas d’IRC (Internet Relay Chat) montre que les usagers des médias à support logiciel peuvent s’engager pleinement dans le processus de conception, une co-construction au sens des Science and Technology Studies : une construction collective, simultanée et mutuelle des acteurs et des artefacts. Une étude de cas portant sur le développement de deux réseaux IRC éclaire ce processus et montre que les « usagers ordinaires » sont parvenus à s’inviter comme co-concepteurs du dispositif.
    [Show full text]
  • Internet Relay Chat. ERIC Digest
    ED425743 1999-01-00 Internet Relay Chat. ERIC Digest. ERIC Development Team www.eric.ed.gov Table of Contents If you're viewing this document online, you can click any of the topics below to link directly to that section. Internet Relay Chat. ERIC Digest............................................... 1 WHY USE INTERNET RELAY CHAT?..................................... 2 WHAT IS REQUIRED?........................................................ 2 HOW IS IRC ORGANIZED?.................................................. 3 NETS..............................................................................3 CHANNELS......................................................................3 OPS............................................................................... 3 NICKS.............................................................................4 HOW DO YOU FIND, JOIN, OR CREATE A CHANNEL?............... 4 CAN YOU SEND A PRIVATE MESSAGE?................................ 4 HOW DOES ONE EXIT AN IRC CHAT?................................... 4 WHAT ARE THE DISADVANTAGES OF IRC?............................4 WHAT EDUCATIONAL BENEFITS CAN I EXPECT?....................5 ERIC Identifier: ED425743 Publication Date: 1999-01-00 Author: Simpson, Carol Source: ERIC Clearinghouse on Information and Technology Syracuse NY. Internet Relay Chat. ERIC Digest. ED425743 1999-01-00 Internet Relay Chat. ERIC Digest. Page 1 of 6 www.eric.ed.gov ERIC Custom Transformations Team THIS DIGEST WAS CREATED BY ERIC, THE EDUCATIONAL RESOURCES INFORMATION CENTER. FOR MORE
    [Show full text]
  • A Review of MS-DOS Bulletin Board Software Suitable for Long Distance
    DOCUMENT RESUME ED 353 977 IR 015 940 AUTHOR Sessa, Anneliese TITLE A Review of MS-DOS Bulletin Board Software Sui:able for Long Distance Learning. PUB DATE 89 NOTE 7p.; For a related paper, see IR 015 939. PUB TYPE Information Analyses (070) Viewpoints (Opinion/Position Papers, Essays, etc.)(120) EDRS PRICE MFO1 /PCO1 Plus Postage. DESCRIPTORS 'Computer Networks; *Computer Software; Databases; Distance Education; *Electronic Mail; Online Systems; *Telecommunications IDENTIFIERS *MS DOS; NYCENET ABSTRACT This paper describes the advantages of using computer bulletin boards systems (BBS) for distance learning, including the use of the New York City Education Network (NYCENET) to access various databases and to communica1. with individuals or the public. Questions to be answered in order to determine the most appropriate software for running a BBS are listed; and the following public domain and shareware BBS software packages suitable for setting up a BBS for long distance learning are reviewed: Magpie, QBBS, PC Board, RBBS, and Opus. One commercial program--The Bread Board System (TBBS)--is also considered. A 1992 update of the information presented in this paper is appended. (ALF) *********************************************************************** Reproductions supplied by EDRS are the best that can be made from the original document. *********************************************************************** U.S DEPARTMENT OF FOUCATION Orfice of Educahonal Research and inproernent EDUCATIONAL RESOURCES INFORMATION CENTER IERICI This aoc umeni has oeen ,ecnoau, ea as I ece.ved I,Or- the person or organ catn, ortglnabng CM.otc-haflgesnel.ebetn,a0elc,,,rlo A Review of MS-DOS Bulletin Board Software reproduchondeahly Po.nts of v.e. or of:Pn'OnS Staled do.cu Suitable for Long distance Learning men! do r,01 necessanly epresent nIlor oil Reviewed By Anneliese Sessa (1989) OERI poshon The idea of using a computer for long distance learningis not very new.
    [Show full text]
  • Instalación Y Administración De Servicios De Mensajería Instantánea, Noticias Y Listas De Distribución
    Servicios de red e internet Instalación y administración de servicios de mensajería instantánea, noticias y listas de distribución Raquel Castellanos Crespo Instalación y administración de servicios de mensajería instantánea, noticias y listas de distribución Servicios de red e internet Raquel Castellanos Crespo INDICE 2 Servicios de red e internet | Instalación y administración de servicios de mensajería instantánea, noticias y listas de distribución Servicios de red e internet Raquel Castellanos Crespo Protocolos La mensajería instantánea (conocida también en inglés como IM) es una forma de comunicación en tiempo real entre dos o más personas basada en texto. El texto es enviado a través de dispositivos conectados a una red como Internet. La mensajería instantánea requiere el uso de un cliente de mensajería instantánea que realiza el servicio y se diferencia del correo electrónico en que las conversaciones se realizan en tiempo real. La mayoría de los servicios ofrecen el "aviso de presencia", indicando cuando el cliente de una persona en la lista de contactos se conecta o en qué estado se encuentra, si está disponible para tener una conversación. En los primeros programas de mensajería instantánea, cada letra era enviada según se escribía y así, las correcciones de las erratas también se veían en tiempo real. Esto daba a las conversaciones más la sensación de una conversación telefónica que un intercambio de texto. En los programas actuales, habitualmente, se envía cada frase de texto al terminarse de escribir. Además, en algunos, también se permite dejar mensajes aunque la otra parte no esté conectada al estilo de un contestador automático. Otra función que tienen muchos servicios es el envío de ficheros.
    [Show full text]
  • Informational Internet Relay
    Network Working Group C. Kalt Request for Comments: 2813 April 2000 Updates: 1459 Category: Informational Internet Relay Chat: Server Protocol Status of this Memo This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Copyright Notice Copyright (C) The Internet Society (2000). All Rights Reserved. Abstract While based on the client-server model, the IRC (Internet Relay Chat) protocol allows servers to connect to each other effectively forming a network. This document defines the protocol used by servers to talk to each other. It was originally a superset of the client protocol but has evolved differently. First formally documented in May 1993 as part of RFC 1459 [IRC], most of the changes brought since then can be found in this document as development was focused on making the protocol scale better. Better scalability has allowed existing world-wide networks to keep growing and reach sizes which defy the old specification. Kalt Informational [Page 1] RFC 2813 Internet Relay Chat: Server Protocol April 2000 Table of Contents 1. Introduction ............................................... 3 2. Global database ............................................ 3 2.1 Servers ................................................ 3 2.2 Clients ................................................ 4 2.2.1 Users ............................................. 4 2.2.2 Services .......................................... 4 2.3 Channels ..............................................
    [Show full text]
  • Recognizing Legal Differences in Computer Bulletin Board Functions Eric Goldman Santa Clara University School of Law, [email protected]
    Santa Clara Law Santa Clara Law Digital Commons Faculty Publications Faculty Scholarship 1-1-1993 Cyberspace, the Free Market and the Free Marketplace of Ideas: Recognizing Legal Differences in Computer Bulletin Board Functions Eric Goldman Santa Clara University School of Law, [email protected] Follow this and additional works at: http://digitalcommons.law.scu.edu/facpubs Part of the Law Commons Recommended Citation 16 Hastings Comm. & Ent. L.J. 87 This Article is brought to you for free and open access by the Faculty Scholarship at Santa Clara Law Digital Commons. It has been accepted for inclusion in Faculty Publications by an authorized administrator of Santa Clara Law Digital Commons. For more information, please contact [email protected]. Cyberspace, the Free Market and the Free Marketplace of Ideas: Recognizing Legal Differences in Computer Bulletin Board Functions by ERIC SCHLACHTER* Table of Contents I. Difficult Issues Resulting from Changing Technologies.. 89 A. The Emergence of BBSs as a Communication M edium ............................................. 91 B. The Need for a Law of Cyberspace ................. 97 C. The Quest for the Appropriate Legal Analogy Applicable to Sysops ................................ 98 II. Breaking Down Computer Bulletin Board Systems Into Their Key Characteristics ................................ 101 A. Who is the Sysop? ......... 101 B. The Sysop's Control ................................. 106 C. BBS Functions ...................................... 107 1. Message Functions ..............................
    [Show full text]
  • Performance of Linear-Type Mobile Data Transmission
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 10, NO. 8, AUGUST 2011 2451 Performance of Linear-Type Mobile Data Transmission Chen-Yuan Chuang, Yi-Bing Lin, Fellow, IEEE, and Yu-Tien Yeh Abstract—In Next Generation Network (NGN), IP Multimedia Subsystem (IMS) plays an important role to offer IP-based multimedia services. Based on Chunghwa Telecom’s NGN/IMS, we develop linear-type data transmission applications such as Bulletin Board System (BBS) or forum-based websites to deliver new articles to the mobile users. We propose the push-N method that pushes every N articles from the BBS server to the user. When the user actually connects to the BBS, the not-yet-pushed messages are pulled by the user. Our study indicates that by selecting appropriate N values, push-N can balance against the push and the pull operations, and therefore improves the user access experience without wasting too much network resources. Index Terms—Forum-based website applications, mobile data transmission, IP multimedia subsystem (IMS). I. INTRODUCTION N Next Generation Network (NGN), IP Multimedia Sub- I system (IMS) supports IP-based broadband multimedia services through mobile devices [1], [2]. Chunghwa Telecom Fig. 1. A simplified NGN/IMS architecture. (CHT), Taiwan, has deployed one of the largest commer- cial NGN/IMS in Asia to provision enhanced voice, video, Based on CHT’s NGN/IMS, we have developed mobile and Internet-based multimedia services. The current CHT data transmission applications that allow pull or push of NGN/IMS capacity can accommodate commercial operation information from an application server (Figure 1 (4)) to a UE for about five hundred thousand subscribers.
    [Show full text]